Next:
1. Introduction
Up:
Operation-based Update Propagation in
Previous:
Operation-based Update Propagation in
Contents
Contents
1. Introduction
2. Coda background
3. Design and Implementation
3.1 Overview
3.2 Logging of user operations
3.3 Shipping of operation log
3.4 Re-execution of user operations
3.5 Validation of re-executions
4. Evaluation
4.1 Experimental setup
4.2 Transparency to applications
4.3 Network traffic reduction
4.4 Reduction of elapsed time
5. Related work and alternative solutions
5.1 Related work
5.2 Alternative solutions
6. Conclusion
Bibliography
Copyright 1999 by Y.W. Lee, K.S. Leung, and M. Satyanarayanan